662 research outputs found
Improved Rate-Equivocation Regions for Secure Cooperative Communication
A simple four node network in which cooperation improves the
information-theoretic secrecy is studied. The channel consists of two senders,
a receiver, and an eavesdropper. One or both senders transmit confidential
messages to the receiver, while the eavesdropper tries to decode the
transmitted message. The main result is the derivation of a newly achievable
rate-equivocation region that is shown to be larger than a rate-equivocation
region derived by Lai and El Gamal for the relay-eavesdropper channel. When the
rate of the helping interferer is zero, the new rate-equivocation region
reduces to the capacity-equivocation region over the wire-tap channel, hence,
the new achievability scheme can be seen as a generalization of a coding scheme
proposed by Csiszar and Korner. This result can naturally be combined with a
rate-equivocation region given by Tang et al. (for the interference assisted
secret communication), yielding an even larger achievable rate-equivocation
region.Comment: 18 pages, 5 figure
Lecture Notes on Network Information Theory
These lecture notes have been converted to a book titled Network Information
Theory published recently by Cambridge University Press. This book provides a
significantly expanded exposition of the material in the lecture notes as well
as problems and bibliographic notes at the end of each chapter. The authors are
currently preparing a set of slides based on the book that will be posted in
the second half of 2012. More information about the book can be found at
http://www.cambridge.org/9781107008731/. The previous (and obsolete) version of
the lecture notes can be found at http://arxiv.org/abs/1001.3404v4/
Secure Anonymous Conferencing in Quantum Networks
Users of quantum networks can securely communicate via so-called (quantum) conference key agreement—making their identities publicly known. In certain circumstances, however, communicating users demand anonymity. Here, we introduce a security framework for anonymous conference key agreement with different levels of anonymity, which is inspired by the ε-security of quantum key distribution. We present efficient and noise-tolerant protocols exploiting multipartite Greenberger-Horne-Zeilinger (GHZ) states and prove their security in the finite-key regime. We analyze the performance of our protocols in noisy and lossy quantum networks and compare with protocols that only use bipartite entanglement to achieve the same functionalities. Our simulations show that GHZ-based protocols can outperform protocols based on bipartite entanglement and that the advantage increases for protocols with stronger anonymity requirements. Our results strongly advocate the use of multipartite entanglement for cryptographic tasks involving several users
Secure Anonymous Conferencing in Quantum Networks
Users of quantum networks can securely communicate via so-called (quantum) conference key agreement—making their identities publicly known. In certain circumstances, however, communicating users demand anonymity. Here, we introduce a security framework for anonymous conference key agreement with different levels of anonymity, which is inspired by the ε-security of quantum key distribution. We present efficient and noise-tolerant protocols exploiting multipartite Greenberger-Horne-Zeilinger (GHZ) states and prove their security in the finite-key regime. We analyze the performance of our protocols in noisy and lossy quantum networks and compare with protocols that only use bipartite entanglement to achieve the same functionalities. Our simulations show that GHZ-based protocols can outperform protocols based on bipartite entanglement and that the advantage increases for protocols with stronger anonymity requirements. Our results strongly advocate the use of multipartite entanglement for cryptographic tasks involving several users
- …